Feistel structures for MPC, and more

MR Albrecht, L Grassi, L Perrin, S Ramacher… - … –ESORICS 2019: 24th …, 2019 - Springer
Efficient PRP/PRFs are instrumental to the design of cryptographic protocols. We investigate
the design of dedicated PRP/PRFs for three application areas-secure multiparty computation …

[PDF][PDF] Status report on the second round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, C Calik… - 2021 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more Authenticated Encryption with Associated …

An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums

K Hu, S Sun, M Wang, Q Wang - … on the Theory and Application of …, 2020 - Springer
Since it was proposed in 2015 as a generalization of integral properties, the division
property has evolved into a powerful tool for probing the structures of Boolean functions …

Improved division property based cube attacks exploiting algebraic properties of superpoly

Y Hao, T Isobe, L Jiao, C Li, W Meier… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
At CRYPTO 2017 and IEEE Transactions on Computers in 2018, Todo et al. proposed the
division property based cube attack method making it possible to launch cube attacks with …

An algebraic attack on ciphers with low-degree round functions: application to full MiMC

M Eichlseder, L Grassi, R Lüftenegger… - Advances in Cryptology …, 2020 - Springer
Algebraically simple PRFs, ciphers, or cryptographic hash functions are becoming
increasingly popular, for example due to their attractive properties for MPC and new proof …

Exploring differential-based distinguishers and forgeries for ASCON

D Gérault, T Peyrin, QQ Tan - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Automated methods have become crucial components when searching for distinguishers
against symmetric-key cryptographic primitives. While MILP and SAT solvers are among the …

Revisiting higher-order differential-linear attacks from an algebraic perspective

K Hu, T Peyrin, QQ Tan, T Yap - … Conference on the Theory and Application …, 2023 - Springer
Abstract The Higher-order Differential-Linear (HDL) attack was introduced by Biham et al. at
FSE 2005, where a linear approximation was appended to a Higher-order Differential (HD) …

[图书][B] Status report on the final round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, LE Bassham… - 2023 - nvlpubs.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more schemes that provide Authenticated …

Automatic search for a variant of division property using three subsets

K Hu, M Wang - Cryptographers' Track at the RSA Conference, 2019 - Springer
The division property proposed at Eurocrypt'15 is a novel technique to find integral
distinguishers, which has been applied to most kinds of symmetric ciphers such as block …

Massive Superpoly Recovery with a Meet-in-the-Middle Framework: Improved Cube Attacks on Trivium and Kreyvium

J He, K Hu, H Lei, M Wang - … International Conference on the Theory and …, 2024 - Springer
The cube attack extracts the information of secret key bits by recovering the coefficient called
superpoly in the output bit with respect to a subset of plaintexts/IV, which is called a cube …